Bug 61411
Summary: | [Nested]L2 guest failed to start in VMware on KVM | ||
---|---|---|---|
Product: | Virtualization | Reporter: | Zhou, Chao (chao.zhou) |
Component: | kvm | Assignee: | virtualization_kvm |
Status: | VERIFIED CODE_FIX | ||
Severity: | normal | CC: | mulix |
Priority: | P1 | ||
Hardware: | All | ||
OS: | Linux | ||
Kernel Version: | 3.11.0-rc1 | Subsystem: | |
Regression: | No | Bisected commit-id: |
Description
Zhou, Chao
2013-09-16 06:54:06 UTC
kvm.git +qemu.git: fd275235_8b303011 test on Ivytown_EP kernel version: 3.17.0-rc1 enable ignore_msrs(echo 1>/sys/module/kvm/parameters/ignore_msrs), then create L1 guest qemu-system-x86_64 --enable-kvm -m 6G -smp 4 -net nic,macaddr=00:16:3e:5a:28:29 -net tap,script=/etc/kvm/qemu-ifup win7-nested.qcow2 -cpu host,-hypervisor vmware boot up successfully this commit fixed the bug: commit a7c0b07d570848e50fce4d31ac01313484d6b844 Author: Wanpeng Li <wanpeng.li@linux.intel.com> Date: Thu Aug 21 19:46:50 2014 +0800 KVM: nVMX: nested TPR shadow/threshold emulation This patch fix bug https://bugzilla.kernel.org/show_bug.cgi?id=61411 TPR shadow/threshold feature is important to speed up the Windows guest. Besides, it is a must feature for certain VMM. We map virtual APIC page address and TPR threshold from L1 VMCS. If TPR_BELOW_THRESHOLD VM exit is triggered by L2 guest and L1 interested in, we inject it into L1 VMM for handling. Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Wanpeng Li <wanpeng.li@linux.intel.com> [Add PAGE_ALIGNED check, do not write useless virtual APIC page address if TPR shadowing is disabled. - Paolo] Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> |